MAC Layer Protocols for Internet of Things: A Survey
نویسندگان
چکیده
منابع مشابه
A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملA Survey on Application Layer Protocols for the Internet of Things
It has been more than fifteen years since the term Internet of Things (IoT) was introduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not been yet clearly defined and there is no common agreement in defining protocols and ...
متن کاملAuthentication Protocols for Internet of Things: A Comprehensive Survey
In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) I...
متن کاملRouting Techniques and Protocols for Internet of Things: a Survey
With massive technological advancements and the growing popularity of digital assistance in everyday life and work environments that goes along with it, technologies are needed to evolve these application domains to the next level. One vision for this is the Internet of Things (IoT).Interconnected devices, embedded in all kinds of objects. In order to turn this vision into reality, routing prot...
متن کاملMac Layer Protocols for Linear Wireless Sensor Networks: a Survey
With the proliferation of new devices and connection technologies, the number and types of wireless sensor networks (WSN) applications have skyrocketed. This diversity has created the need to take a more systematic approach in defining the specifics and requirements of different types of WSNs. A major criterion is the topology of a WSN, which plays an important role in the trade-off between ens...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2019
ISSN: 1999-5903
DOI: 10.3390/fi11010016